General
-
Target
60fa3a64e42529dee97e6b90cd587bee6b3b01761af673b38866bf8e4cd291b4
-
Size
2.5MB
-
Sample
241207-yfrnhszpay
-
MD5
c0070683f5003060431b586e4e8fbcd1
-
SHA1
51d5e777ef32501a7e7d1e1c883e5b40efe0f939
-
SHA256
60fa3a64e42529dee97e6b90cd587bee6b3b01761af673b38866bf8e4cd291b4
-
SHA512
85fc554b251bb90d15bc3e687ec6293a74a210edeb3b4a8faaa0fada29d2157e6afe27d67a589546ebe7ff6d0a5b6206ddc2c58945b664cedf781dbc2044f436
-
SSDEEP
49152:WVfy+BDG9Ze9jv4Fan9vGPqIIKubsISTb/am5B8y6sEUhSSwhUPMub:GXxWeVv4c4PqrbsIW/amj8yF8Sp
Behavioral task
behavioral1
Sample
60fa3a64e42529dee97e6b90cd587bee6b3b01761af673b38866bf8e4cd291b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
60fa3a64e42529dee97e6b90cd587bee6b3b01761af673b38866bf8e4cd291b4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.65.129:4433
Targets
-
-
Target
60fa3a64e42529dee97e6b90cd587bee6b3b01761af673b38866bf8e4cd291b4
-
Size
2.5MB
-
MD5
c0070683f5003060431b586e4e8fbcd1
-
SHA1
51d5e777ef32501a7e7d1e1c883e5b40efe0f939
-
SHA256
60fa3a64e42529dee97e6b90cd587bee6b3b01761af673b38866bf8e4cd291b4
-
SHA512
85fc554b251bb90d15bc3e687ec6293a74a210edeb3b4a8faaa0fada29d2157e6afe27d67a589546ebe7ff6d0a5b6206ddc2c58945b664cedf781dbc2044f436
-
SSDEEP
49152:WVfy+BDG9Ze9jv4Fan9vGPqIIKubsISTb/am5B8y6sEUhSSwhUPMub:GXxWeVv4c4PqrbsIW/amj8yF8Sp
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-